{"id":"CVE-2016-2347","details":"Integer underflow in the decode_level3_header function in lib/lha_file_header.c in Lhasa before 0.3.1 allows remote attackers to execute arbitrary code via a crafted archive.","modified":"2026-04-11T03:43:42.710188Z","published":"2017-04-21T20:59:00.557Z","related":["SUSE-SU-2016:1091-1","openSUSE-SU-2024:10490-1"],"references":[{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-updates/2016-04/msg00038.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-updates/2016-04/msg00039.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3540"},{"type":"FIX","url":"https://github.com/fragglet/lhasa/commit/6fcdb8f1f538b9d63e63a5fa199c5514a15d4564"},{"type":"FIX","url":"https://github.com/fragglet/lhasa/releases/tag/v0.3.1"},{"type":"EVIDENCE","url":"http://www.talosintelligence.com/reports/TALOS-2016-0095/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/fragglet/lhasa","events":[{"introduced":"0"},{"last_affected":"2a6cc7f93cd97521bc46ca8ee286ce1d83feb185"},{"fixed":"6fcdb8f1f538b9d63e63a5fa199c5514a15d4564"},{"fixed":"c6d6ca6df218a54c94443f8d15afe2869461506f"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"0.3.0"}]}}],"versions":["v0.0.1","v0.0.2","v0.0.3","v0.0.4","v0.0.5","v0.0.6","v0.0.7","v0.1.0","v0.2.0","v0.3.0"],"database_specific":{"vanir_signatures_modified":"2026-04-11T03:43:42Z","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"42.1"}]},{"events":[{"introduced":"0"},{"last_affected":"13.2"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]}],"vanir_signatures":[{"deprecated":false,"signature_version":"v1","id":"CVE-2016-2347-127c86b4","target":{"file":"lib/lha_file_header.c","function":"extend_raw_data"},"signature_type":"Function","digest":{"function_hash":"205213664740166912401818331102733821536","length":450},"source":"https://github.com/fragglet/lhasa/commit/6fcdb8f1f538b9d63e63a5fa199c5514a15d4564"},{"deprecated":false,"signature_version":"v1","id":"CVE-2016-2347-2951ef9d","target":{"file":"lib/lha_file_header.c","function":"decode_level3_header"},"signature_type":"Function","digest":{"function_hash":"243803080807595711965693796938017383515","length":919},"source":"https://github.com/fragglet/lhasa/commit/6fcdb8f1f538b9d63e63a5fa199c5514a15d4564"},{"deprecated":false,"signature_version":"v1","id":"CVE-2016-2347-9e27d471","target":{"file":"lib/lha_file_header.c"},"signature_type":"Line","digest":{"threshold":0.9,"line_hashes":["81857088144805919651521459705044896562","90865436915124334063461346229748683849","168603969358282847260008075131334827623","101587154781056942032226788173318447276","164140291529182583489359734877066170927","271716932972871301892963359679777099513","72133410738862859589332295645323222629"]},"source":"https://github.com/fragglet/lhasa/commit/6fcdb8f1f538b9d63e63a5fa199c5514a15d4564"}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-2347.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}